Affiliation:
1. Ecole Polytechnique Fédérale de Lausanne (EPFL), Switzerland
2. University of Massachusetts, MA
Abstract
Embedded cryptographic systems, such as smart cards, require secure implementations that are robust to a variety of low-level attacks.
Side-Channel Attacks (SCA)
exploit the information such as power consumption, electromagnetic radiation and acoustic leaking through the device to uncover the secret information. Attackers can mount successful attacks with very modest resources in a short time period. Therefore, many methods have been proposed to increase the security against SCA. Randomizing the execution order of the instructions that are independent, i.e.,
random shuffling
, is one of the most popular among them. Implementing instruction shuffling in software is either implementation specific or has a significant performance or code size overhead. To overcome these problems, we propose in this work a generic custom hardware unit to implement random instruction shuffling as an extension to existing processors. The unit operates between the CPU and the instruction cache (or memory, if no cache exists), without any modification to these components. Both true and pseudo random number generators are used to dynamically and locally provide the shuffling sequence. The unit is mainly designed for in-order processors, since the embedded devices subject to these kind of attacks use simple in-order processors. More advanced processors (e.g., superscalar, VLIW or EPIC processors) are already more resistant to these attacks because of their built-in ILP and wide word size. Our experiments on two different soft in-order processor cores, i.e., OpenRISC and MicroBlaze, implemented on FPGA show that the proposed unit could increase the security drastically with very modest resource overhead. With around 2% area, 1.5% power and no performance overhead, the shuffler increases the effort to mount a successful power analysis attack on AES software implementation over 360 times.
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Information Systems,Software
Reference41 articles.
1. Alfke P. 1996. Efficient shift registers LFSR counters and long pseudo random sequence generators. http://www.xilinx.com/support/documentation/application_notes/xapp052.pdf. Alfke P. 1996. Efficient shift registers LFSR counters and long pseudo random sequence generators. http://www.xilinx.com/support/documentation/application_notes/xapp052.pdf.
2. ARM. Downloaded on October 21st 2011. SecurCore processors. http://www.arm.com/products/processors/securcore/index.php. ARM. Downloaded on October 21st 2011. SecurCore processors. http://www.arm.com/products/processors/securcore/index.php.
3. Energy-aware design techniques for differential power analysis protection
4. Provably Secure Masking of AES
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Configurable Loop Shuffling via Instruction Set Extensions;2024 IEEE 35th International Conference on Application-specific Systems, Architectures and Processors (ASAP);2024-07-24
2. Special Session: Mitigating Side-channel Attacks through Circuit to Application Layer Approaches;Proceedings of the 2023 International Conference on Hardware/Software Codesign and System Synthesis;2023-09-17
3. Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study;IEEE Access;2023
4. ISA Extensions of Shuffling Against Side-channel Attacks;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2023
5. Time- and Amplitude-Controlled Power Noise Generator against SPA Attacks for FPGA-Based IoT Devices;Journal of Low Power Electronics and Applications;2022-09-10